Computer and Information Security Handbook / edited by Vacca, John
Material type:
- QA76.9.A25 COM
Item type | Current library | Home library | Shelving location | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
Harare Institute of Technology Main Library | Harare Institute of Technology Main Library | General Collection | QA76.9.A25 COM (Browse shelf(Opens below)) | 1 | Available | bk00011565 |
Browsing Harare Institute of Technology Main Library shelves, Shelving location: General Collection Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
No cover image available |
![]() |
![]() |
![]() |
||
QA76.9.A25 BIS Computer Security Art and Science / | QA76.9.A25 COL Network security bible / | QA76.9.A25 COL Network security bible / | QA76.9.A25 COM Computer and Information Security Handbook / | QA 76.9.A25 COM Computer and information security Handbook / | QA 76.9.A25 COM Computer and information security Handbook / | QA 76.9.A25 COM Applied Network security monitoring : Collection, Detection, and Analysis / |
Includes index.
There are no comments on this title.
Log in to your account to post a comment.